Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
-
Upload
marjory-lucas -
Category
Documents
-
view
215 -
download
0
Transcript of Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
![Page 1: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/1.jpg)
Wireless Networking Concepts
By: Forrest Finkler
Computer Science 484 Networking Concepts
![Page 2: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/2.jpg)
Summary
• What is a Wireless Network
• Methods of Securing Wireless Networks• WEP (Wired Equivalent Privacy)• WPA (Wi-Fi Protected Access)• MAC (Media Access Control) Address Filtering
• Security Flaws of Wireless Data Networks
• How to Bypass Security
![Page 3: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/3.jpg)
What is a wireless network
• Wireless Networks Connect Computers Together and Allow Data to Travel Wirelessly Between an Access Point and a Client
![Page 4: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/4.jpg)
What is a wireless network
• Wireless Networks Use Access Points and Clients to Communicate With Each Other
• Radio Communications
• 2.4 GHz (b, g, n) or 5 GHz(a, n) band
• 11Mbps (b), 54Mbps (g, a)128 Mbps (n)
• Allows for movement (roaming) between access points
![Page 5: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/5.jpg)
Securing Wireless Networks
• WEP (Introduced in 1999)• 64 or 128 bit• 64 Bit
• Uses a 40 bit key• 10 Hexadecimal Numbers “F2C7BB35B9”• 10 Hex * 4 bits per number = 40 bits• 40 bits + 24 IV = 64 bits
• 128 Bit• Uses a 104 bit key• 24 Hexadecimal Numbers “2B204A3F1042643E480FDD655E”• 24 Hex * 4 bits per number = 108 bits• 104 bits + 24 IV = 128 bits
![Page 6: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/6.jpg)
Securing Wireless Networks
• Wi-Fi Protected Access• WPA or WPA2• WPA
• 128-bit key and a 48-bit IV• Uses Temporal Key Integrity Protocol (TKIP)
• Better Security Through Dynamic Keys• Based on 802.11i Draft Standards
• WPA2• 128-bit key and a 48-bit IV• Uses Advanced Encryption Standard (AES)
• Uses a Matrix of Bits and Rounds (mathematical operations) to Authenticate Clients
• Based on 802.11i
![Page 7: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/7.jpg)
Securing Wireless Networks
• Media Access Control Address Filtering• MAC Addresses• MAC Addresses are 48 bits and are Unique to Each NIC• Typical MAC Address “00:0F:66:2A:A5:D5”
• Weaknesses• MAC Addresses are Easily Spoofed Using Software• A Very Weak Security Measure Only Should be Used in
Conjunction With WEP or WPA
![Page 8: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/8.jpg)
How to bypass WLAN security
• MAC Address Spoofing (<20 seconds)• ifdown eth0
• ifconfig eth0 hw ether 00:80:FF:FF:98:F5
• ifup eth0
• WEP Cracking (2 min-30 min)• Kismet (captures raw packets(need 20,000 to 500,000 IV’s))
• Aircrack (decrypts packets and finds WEP key)
• WPA Cracking (15 min-∞)• Only Crackable if Using a PSK
• Brute Force Attack
![Page 9: Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e9e5503460f94ba03cf/html5/thumbnails/9.jpg)
QUESTIONS?